Unified hardware abstraction layer with device masquerade
Abstract
References
Index Terms
- Unified hardware abstraction layer with device masquerade
Recommendations
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization
NCA '09: Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and ApplicationsDevice driver failures have been shown to be a major cause of system failures. Network services stress NIC device drivers, increasing the probability of NIC driver bugs being manifested as server failures. System virtualization is increasingly used for ...
A Low Overhead and Reliable Nested Virtualization VMM for Cloud Computing
WISA '13: Proceedings of the 2013 10th Web Information System and Application ConferenceCommodity operating systems have already gained functionality of virtual machine monitor. Nested virtualization is needed to run these commodity operating systems as virtual machines. Furthermore, with nested virtualization technology, users can run a ...
Enabling semantic communications for virtual machines via iConnect
VTDC '07: Proceedings of the 2nd international workshop on Virtualization technology in distributed computingiConnect is an abstraction that encapsulates all of a virtual machine's interactions with outside entities. Its intent is to exploit semantic information to better support the end-to-end requirements of such VM communications. Focusing on the I/O ...
Comments
Information & Contributors
Information
Published In
- Conference Chairs:
- Hisham M. Haddad,
- Roger L. Wainwright,
- Richard Chbeir
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigapp
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 161Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in